Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)Retrieving relevant CAPEC attack patterns for secure software development., , , and . CISR, page 33-36. ACM, (2014)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)A Survey of U.S. Laws for Health Information Security & Privacy., , , and . Int. J. Inf. Secur. Priv., 6 (4): 40-54 (2012)Teaching Operating Systems Using Visualization: A Comparative Study., , , and . Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Springer, (2008)A Personal Software Process Tool for Eclipse Environment., , , and . Software Engineering Research and Practice, page 717-723. CSREA Press, (2005)Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery., , , , , , , , , and . Remote. Sens., 15 (19): 4769 (October 2023)An Automated Security Concerns Recommender Based on Use Case Specification Ontology., , , and . Autom. Softw. Eng., 29 (2): 42 (2022)Supporting Case-Based Learning in Information Security with Web-Based Technology., , and . J. Inf. Syst. Educ., 24 (1): 31-40 (2013)Implementing a network intrusion detection system using semi-supervised support vector machine and random forest., , , , and . ACM Southeast Conference, page 180-184. ACM, (2021)